See https://www.lunasec.io/docs/blog/log4j-zero-day/ and https://www.randori.com/blog/cve-2021-44228/.

Brief summary: a Remote Code Execution vulnerability was discovered yesterday in Log4J between versions 2.0 and 2.14.1 inclusive. This vulnerability was patched in the most recent release, 2.15.0.

I see that the Spring Boot Logging Starter has a dependency to org.apache.logging.log4j:log4j-to-slf4j, at version 2.14.1, a vulnerable version.

From what I can tell, log4j-to-slf4j is the only artifact of the group org.apache.logging.log4j to which Spring Boot has any dependency. I am unsure whether this artifact alone exposes this vulnerability, or if only the log4j-core artifact is vulnerable.

Raising this issue as a "better safe than sorry" measure, to discern if Spring is left vulnerable here, and patch to most recent version if so.

Comment From: wilkinsona

Duplicates https://github.com/spring-projects/spring-boot/issues/28978 and https://github.com/spring-projects/spring-boot/issues/28958. It is only the log4j-core artifact that is vulnerable.

Comment From: andersthorbeck

Ah, apologies, I see now that I only searched in open issues before I created this one, not also in closed issues. Thank you for your swift response!